Category Archives: Security

iPad Manufacturer Looking Towards Cloud Computing

iPad Manufacturer Looking Towards Cloud Computing

iPad Manufacturer Looking Towards Cloud Computing Most people reading this article would be wondering why we would say that Apple’s entering the cloud computing now; after all, there have been articles galore, many on this website itself, covering Apple’s move to the cloud earlier with the predictably-named iCloud. Here are a few of them: 1.…

Gartner Introduces: New Magic Quadrant for Public Cloud IaaS

Gartner Introduces: New Magic Quadrant for Public Cloud IaaS I’m happy to announce that the new Gartner Magic Quadrant for Public Cloud Infrastructure as a Service has been published. (Client-only link. Sorry; I’ll link a public reprint when one is available.) This is a brand-new Magic Quadrant; our previous Magic Quadrant has essentially been split into two MQs, this new Public…

Cloud Computing Pitfalls to Watch for in 2012

Cloud Pitfalls to Watch for in 2012 As the end of the year for 2011 makes its inexorable approach, the forecasts for 2012, in particular for cloud computing are flying helter-skelter. Both IDC and Gartner have weighed in with their forecasts and many more continue to release their forecasts regarding cloud computing for next year.…

Cloud Computing: Hardware As Software

There’s a lot of confusion surrounding this elegant approach to marshaling remote computer resources. And, we do not wish to profit from the confusion created by the broad marketing of cloud computing to the public. So here we offer a definition of cloud computing that is easy to understand, accurate, and without marketing hype. 1.…

Adding Another Card To Your Cloud Adoption Deck

Adding Another Card To Your Cloud Adoption Deck For the most part we’ve all heard how the adoption or embracing of the Cloud will help enterprise users to save costs. Those CIOs, CTOs and IT officers who support the Cloud or have been pushing their top brass to accept Cloud adoption have almost always played…

Disaster Recovery in Cloud Computing

Disaster Recovery in Cloud Computing

Disaster Recovery in Cloud Computing Considering a cloud service offering? You’re not alone. Practically every IT organization out there is at least discussing the cloud as a way to improve services, save money, or shift workloads, and there’s good reason for that. While the cloud might not be for everyone, it has tremendous advantages for understaffed…

2012 Will Be All About the Data, and How We Manage It: Creating Trusted Data Networks Part 2

2012 Will Be All About the Data, and How We Manage It … Just as Julie Andrews taught us in Sound of Music (yes geeks can still like musicals), let’s start at the very beginning, which in this case is the data. We have all seen the stats about the astronomical data growth. IDC says we…

Contributors

Featured Writers

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter